Profile cover photo
Profile photo
Stux Noid
1 follower
1 follower
About
Posts

Post has attachment
I will go with the term —-“ According to me”, the dream is a dimension where we are not the mere projection of ourselves. There are many theories on dreams because it actually breaks the main scientific cause of the dream itself. Scientifically a dream is…
Add a comment...

Post has attachment
I will go with the term —-“ According to me”, the dream is a dimension where we are not the mere projection of ourselves. There are many theories on dreams because it actually breaks the main scientific cause of the dream itself. Scientifically a dream is…
Add a comment...

Post has attachment
The Tesla’s board of directors announce Robyn Denholm as the new Chair of the Tesla board, effective immediately. Tesla announced on Wednesday night that Australian telecom executive and chair of Tesla’s audit committee will take over from Elon Musk as…
Add a comment...

Post has attachment
This bug was actually before the email confirmation but quite interesting vulnerability to share and can be done for a certain period of time … Normally a Facebook user’s profile will have all the features enabled by default. But some users tend to manage…
Add a comment...

Post has attachment
This bug was actually before the email confirmation but quite interesting vulnerability to share and can be done for a certain period of time … Normally a Facebook user’s profile will have all the features enabled by default. But some users tend to manage…
Add a comment...

Post has attachment
This O day made my day. The exploit for the big man of the software companies ( The microsoft) was recently released. This vulnerability is due to the Windows task scheduler and more importantly on the ALPC  (Advanced Local Procedure Call) interface which…
Add a comment...

Post has attachment
This O day made my day. The exploit for the big man of the software companies ( The microsoft) was recently released. This vulnerability is due to the Windows task scheduler and more importantly on the ALPC  (Advanced Local Procedure Call) interface which…
Add a comment...

Post has attachment
Anindya Maiti from University of Texas at San Antonio has recently published a research paper on “Light Ears: Information Leakage via Smart Lights”. In his research paper, Maiti has disclosed that Multimedia preferences can be deduced and can be pivoted…
Add a comment...

Post has attachment
Researchers from Checkpoint have identified a new type of vulnerability that puts the Android users at risk. The vulnerability dubbed Man In The Disk can be leveraged by Hackers to crash Applications, DOS and even install malicious applications on any…
Add a comment...

Post has attachment
Many websites nowadays store users passwords in website logs for the ease of the administrator or it’s the only way sometimes. In the case of computers, the passwords for the personal accounts are stored in the browser or any other part of the computer.…
Add a comment...
Wait while more posts are being loaded